ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

IAgility Propose des solutions et services innovants destinés à optimiser l'Expérience, la gestion et la relation Client. Nous intégrons des solutions de communications et d'interactions à valeur ajoutée, financés par une nouvelle approche entre les systèmes d'informations, les applications professionnelles et les infrastructures réseaux et télécoms. Nous sommes spécialisés sur les métiers du centre d'appels, et pourtant, nous répondons aussi bien sur les grands-comptes que les administrations, pour des projets de taille et de complexité variables. Opérateur de télécom et réseaux international, nous couvrons plus de 170 pays. Avec plus de 1200 Clients et plus de 250 sites connectés à nos infra réseaux (voix/data), IAgility vous fait bénéficier de son expérience dans le conseil, l'intégration et le suivi opérationnel des meilleurs solutions mondiales reconnues. Après avoir travaillé, et intégré la plupart des solutions du marché, nous avons choisi pour vous...

IAgility A.I CyberSecurity Scoring

IAgility

Company Details

Linkedin ID:

iagility

Employees number:

3

Number of followers:

362

NAICS:

51125

Industry Type:

Computer Networking Products

Homepage:

iagility.fr

IP Addresses:

0

Company ID:

IAG_1418874

Scan Status:

In-progress

AI scoreIAgility Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/iagility.jpeg
IAgility Computer Networking Products
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreIAgility Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/iagility.jpeg
IAgility Computer Networking Products
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

IAgility Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

IAgility Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for IAgility

Incidents vs Computer Networking Products Industry Average (This Year)

No incidents recorded for IAgility in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for IAgility in 2025.

Incident Types IAgility vs Computer Networking Products Industry Avg (This Year)

No incidents recorded for IAgility in 2025.

Incident History — IAgility (X = Date, Y = Severity)

IAgility cyber incidents detection timeline including parent company and subsidiaries

IAgility Company Subsidiaries

SubsidiaryImage

IAgility Propose des solutions et services innovants destinés à optimiser l'Expérience, la gestion et la relation Client. Nous intégrons des solutions de communications et d'interactions à valeur ajoutée, financés par une nouvelle approche entre les systèmes d'informations, les applications professionnelles et les infrastructures réseaux et télécoms. Nous sommes spécialisés sur les métiers du centre d'appels, et pourtant, nous répondons aussi bien sur les grands-comptes que les administrations, pour des projets de taille et de complexité variables. Opérateur de télécom et réseaux international, nous couvrons plus de 170 pays. Avec plus de 1200 Clients et plus de 250 sites connectés à nos infra réseaux (voix/data), IAgility vous fait bénéficier de son expérience dans le conseil, l'intégration et le suivi opérationnel des meilleurs solutions mondiales reconnues. Après avoir travaillé, et intégré la plupart des solutions du marché, nous avons choisi pour vous...

Loading...
similarCompanies

IAgility Similar Companies

EchoStar Corporation

EchoStar Corporation (Nasdaq: SATS) is a premier provider of technology, networking services, television entertainment and connectivity, offering consumer, enterprise, operator and government solutions worldwide under its EchoStar®, Boost Mobile®, Sling TV, DISH TV, Hughes®, HughesNet®, HughesON™ an

Bharti Enterprises

Bharti Enterprises is one of India’s leading business group with diversified interests in telecom, financial services, real estate, hospitality, agri and food. Bharti has been a pioneering force in the Indian telecom sector with many firsts and innovations to its credit. Bharti Airtel, the group's

Our 15 000 talented colleagues serve millions of customers every day in one of the world’s most connected regions. With a strong connectivity base, we’re the hub in the digital ecosystem, empowering people, companies and societies to stay in touch with everything that matters 24/7/365 - on their ter

Telcel

Telcel (Radiomóvil Dipsa) es subsidiaria de América Móvil, uno de los mayores proveedores de comunicaciones celulares de Latinoamérica, grupo líder con inversiones en telecomunicaciones en varios países del continente americano. Telcel es la empresa de telefonía celular líder en México. Nuestra s

Spectrum

Charter Communications, Inc. (NASDAQ: CHTR) is a leading broadband connectivity company and cable operator with services available to more than 57 million homes and businesses in 41 states through its Spectrum brand. Over an advanced communications network, the company offers a full range of state-o

Vodafone Idea Limited

Vodafone Idea Limited is an Aditya Birla Group and Vodafone Group partnership. It is India’s leading telecom service provider. The Company provides pan India Voice and Data services across 2G, 3G and 4G platform. With the large spectrum portfolio to support the growing demand for data and voice, the

newsone

IAgility CyberSecurity News

October 06, 2025 07:00 AM
Opinion: Behind the mask: How AI is powering a new generation of cyber threats

ARTIFICIAL intelligence (AI) is reshaping the world, with both promise and peril. While Malaysia's ambition to lead in AI innovation is...

September 04, 2025 07:00 AM
Are Enterprises Ready For Quantum-Safe Cybersecurity?

The looming arrival of quantum computing presents a fundamental threat to modern cybersecurity, potentially rendering current encryption...

September 02, 2025 07:00 AM
Payment Fraud Protector Appoints a Cybersecurity Veteran to Boost Product

In March, we reported on Vancouver-based INETCO partnering with Brazilian IT firm Agility and payment processor Elo to enhance security and...

June 23, 2025 07:00 AM
Shareholders Back Access Bank’s Inclusive Growth Agenda at 17th AGM

Access Bank (Ghana) PLC held its 17th Annual General Meeting (AGM) on Friday, June 20, 2025, at the Bank's Head Office in Accra,...

October 03, 2024 07:00 AM
Sagard-backed Audensiel acquires tech consultancy Maltem Canada

French business and technology consulting company Audensiel has acquired Montréal-based digital consultancy Maltem Canada for an undisclosed...

July 09, 2024 07:00 AM
Candor Technology announces new C-suite executive

Candor Technology has announced a new addition to its executive team. Industry veteran Eric Rawlings (pictured) will take on the position of chief technology...

March 11, 2024 11:39 PM
Navigating the Labyrinth of Digital Cyberthreats Using AI-Powered Cryptographic Agility

Explore how AI-powered cryptographic agility is revolutionizing cybersecurity, helping organizations navigate complex digital threats.

May 07, 2021 07:00 AM
Jason Witty: ‘We have to adapt to new ways of thinking’

Jason Witty, head of cybersecurity and technology controls, and global chief information security officer for JPMorgan Chase, says security...

October 12, 2019 12:10 PM
Enterprise Network Equipment Market Trend Analysis 2035

Enterprise Network Equipment Market Analysis, By Product Type (Routers, Switches, WLAN Equipment, Network Security Equipment, Network Management Tools,...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

IAgility CyberSecurity History Information

Official Website of IAgility

The official website of IAgility is http://www.iagility.fr.

IAgility’s AI-Generated Cybersecurity Score

According to Rankiteo, IAgility’s AI-generated cybersecurity score is 750, reflecting their Fair security posture.

How many security badges does IAgility’ have ?

According to Rankiteo, IAgility currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does IAgility have SOC 2 Type 1 certification ?

According to Rankiteo, IAgility is not certified under SOC 2 Type 1.

Does IAgility have SOC 2 Type 2 certification ?

According to Rankiteo, IAgility does not hold a SOC 2 Type 2 certification.

Does IAgility comply with GDPR ?

According to Rankiteo, IAgility is not listed as GDPR compliant.

Does IAgility have PCI DSS certification ?

According to Rankiteo, IAgility does not currently maintain PCI DSS compliance.

Does IAgility comply with HIPAA ?

According to Rankiteo, IAgility is not compliant with HIPAA regulations.

Does IAgility have ISO 27001 certification ?

According to Rankiteo,IAgility is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of IAgility

IAgility operates primarily in the Computer Networking Products industry.

Number of Employees at IAgility

IAgility employs approximately 3 people worldwide.

Subsidiaries Owned by IAgility

IAgility presently has no subsidiaries across any sectors.

IAgility’s LinkedIn Followers

IAgility’s official LinkedIn profile has approximately 362 followers.

NAICS Classification of IAgility

IAgility is classified under the NAICS code 51125, which corresponds to Software Publishers.

IAgility’s Presence on Crunchbase

No, IAgility does not have a profile on Crunchbase.

IAgility’s Presence on LinkedIn

Yes, IAgility maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/iagility.

Cybersecurity Incidents Involving IAgility

As of November 28, 2025, Rankiteo reports that IAgility has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

IAgility has an estimated 949 peer or competitor companies worldwide.

IAgility CyberSecurity History Information

How many cyber incidents has IAgility faced ?

Total Incidents: According to Rankiteo, IAgility has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at IAgility ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=iagility' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge